KDD CUP 2020 ML Track 2 "Adversarial Attacks and Defense on Academic Graph": 1st Place Solution
☆19Sep 29, 2020Updated 5 years ago
Alternatives and similar repositories for KDD_CUP_2020_MLTrack2_SPEIT
Users that are interested in KDD_CUP_2020_MLTrack2_SPEIT are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Graph Robustness Benchmark: A scalable, unified, modular, and reproducible benchmark for evaluating the adversarial robustness of Graph M…☆99Nov 6, 2023Updated 2 years ago
- Graph Injection Adversarial Attack & Defense Dataset , extracted from KDD CUP 2020 ML2 Track☆22Aug 19, 2024Updated last year
- ☆10Jan 7, 2026Updated 3 months ago
- Tools for "Another Flip in the Wall"☆41Jun 12, 2018Updated 7 years ago
- [ICLR 2022] Understanding and Improving Graph Injection Attack by Promoting Unnoticeability☆38Nov 27, 2023Updated 2 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Apply Iprompt on GLM with innovative new methods. Currently support Chinese QA, English QA and Chinese poem generation.☆20Jun 16, 2022Updated 3 years ago
- An evaluation framework for mitigating DNN backdoor attacks using data augmentations☆11Dec 10, 2020Updated 5 years ago
- Code for Towards More Practical Adversarial Attacks on Graph Neural Networks (NeurIPS 2020)☆27Nov 13, 2021Updated 4 years ago
- This is the code for semi-supervised robust training (SRT).☆18Mar 24, 2023Updated 3 years ago
- ☆14May 14, 2019Updated 6 years ago
- [EMNLP 2024] The official GitHub repo for the paper "Course-Correction: Safety Alignment Using Synthetic Preferences"☆20Oct 2, 2024Updated last year
- code for paper TDGIA:Effective Injection Attacks on Graph Neural Networks (KDD 2021, research track)☆22Nov 5, 2021Updated 4 years ago
- Official Code For Dual Grained Quantization: Efficient Fine-Grained Quantization for LLM☆14Dec 27, 2023Updated 2 years ago
- EMNLP 2020: Filtering before Iteratively Referring for Knowledge-Grounded Response Selection in Retrieval-Based Chatbots☆12Dec 15, 2020Updated 5 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- ☆12Feb 4, 2025Updated last year
- Implementation of our ICLR 2021 paper: Policy-Driven Attack: Learning to Query for Hard-label Black-box Adversarial Examples.☆11Mar 9, 2021Updated 5 years ago
- An FL algorithm inspired by FedGMA☆11Oct 21, 2023Updated 2 years ago
- Code used to create the Linked WikiText-2 dataset☆16May 22, 2023Updated 2 years ago
- Adversarial Attack on Graph Neural Networks as An Influence Maximization Problem☆20Oct 27, 2021Updated 4 years ago
- LSA : Layer Sustainability Analysis framework for the analysis of layer vulnerability in a given neural network. LSA can be a helpful too…☆18Mar 22, 2022Updated 4 years ago
- This is the code repository of our submission: Understanding the Dark Side of LLMs’ Intrinsic Self-Correction.☆61Dec 20, 2024Updated last year
- Official Implementation for PlugIn Inversion☆16Oct 23, 2021Updated 4 years ago
- [ICLR 2021: Spotlight] Source code for the paper "A Panda? No, It's a Sloth: Slowdown Attacks on Adaptive Multi-Exit Neural Network Infer…☆14Feb 16, 2022Updated 4 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- ☆16Feb 2, 2023Updated 3 years ago
- Official code of paper "MaskSim: Detection of synthetic images by masked spectrum similarity analysis", CVPRW 2024.☆16Jul 16, 2025Updated 9 months ago
- ☆16Jun 26, 2021Updated 4 years ago
- ☆15Oct 2, 2024Updated last year
- [SIGCOMM 2021] ARROW: Restoration-Aware Traffic Engineering☆15Oct 27, 2021Updated 4 years ago
- Source code for ScaleGrad☆19Dec 28, 2021Updated 4 years ago
- 🌾 Universal, customizable and deployable fine-grained evaluation for text generation.☆24Oct 26, 2023Updated 2 years ago
- Adversarially Robust Transfer Learning with LWF loss applied to the deep feature representation (penultimate) layer☆19Feb 9, 2020Updated 6 years ago
- Initially based on CASIA1 - code to get the tamper mask and generate test/train sets without data leakage between them.☆13Jun 12, 2019Updated 6 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Tools for extracting/reverse engineering Bloodborne game files☆21Jan 27, 2018Updated 8 years ago
- 熊猫TV弹幕助手☆32May 27, 2018Updated 7 years ago
- ☆11Dec 1, 2020Updated 5 years ago
- ☆19Mar 24, 2023Updated 3 years ago
- They are tools for Kaggle competition for me☆27Jun 26, 2020Updated 5 years ago
- 1st solution for KDD Cup 2020 (RL track)☆62Aug 28, 2020Updated 5 years ago
- [ACL 2024] The official GitHub repo for the paper "The Earth is Flat because...: Investigating LLMs' Belief towards Misinformation via Pe…☆82Jul 19, 2024Updated last year